Showing 561 - 580 results of 19,511 for search '"algorithm"', query time: 0.09s Refine Results
  1. 561

    Algorithm for blind separation of PCMA based on CHASE decoding by Jian DU, Ke-xian GONG, Hua PENG

    Published 2015-03-01
    “…On the basis of SOVA-PSP, a novel algorithm for blind separation of PCMA signal was presented based on CHASE decoding. …”
    Get full text
    Article
  2. 562

    New Iterative Method Based on Laplace Decomposition Algorithm by Sabir Widatalla, M. Z. Liu

    Published 2013-01-01
    “…We introduce a new form of Laplace decomposition algorithm (LDA). By this form a new iterative method was achieved in which there is no need to calculate Adomian polynomials, which require so much computational time for higher-order approximations. …”
    Get full text
    Article
  3. 563

    Simultaneous Pose and Correspondence Estimation Based on Genetic Algorithm by Haiwei Yang, Fei Wang, Zhe Li, Hang Dong

    Published 2015-11-01
    “…Although several algorithms have been presented to solve the simultaneous pose and correspondence estimation problem, the correct solution may not be reached to with the traditional random-start initialization method. …”
    Get full text
    Article
  4. 564

    The Transcultural Diabetes Nutrition Algorithm: A Canadian Perspective by Réjeanne Gougeon, John L. Sievenpiper, David Jenkins, Jean-François Yale, Rhonda Bell, Jean-Pierre Després, Thomas P. P. Ransom, Kathryn Camelon, John Dupre, Cyril Kendall, Refaat A. Hegazi, Albert Marchetti, Osama Hamdy, Jeffrey I. Mechanick

    Published 2014-01-01
    “…The Transcultural Diabetes Nutrition Algorithm (tDNA) is a clinical tool designed to facilitate implementation of therapeutic lifestyle recommendations for people with or at risk for type 2 diabetes. …”
    Get full text
    Article
  5. 565
  6. 566

    Improved rule-based backward fuzzy reasoning algorithm by ZHANG Wen1, ZHANG Gui-xu1

    Published 2008-01-01
    “…An improved rule-based backward fuzzy reasoning algorithm was pointed. The algorithm is based on the fuzzy Petri net (FPN) which represents fuzzy production rules. …”
    Get full text
    Article
  7. 567
  8. 568
  9. 569

    A resource allocation algorithm based on double slots by EIPeng L, IYouming L, ITing L, HOUGuili Z, UCaimei F

    Published 2016-05-01
    “…A resource allocation algorithm based on double slots was proposed to minimize the transmitting power in wireless communications.Being aware of the channel difference between the two adjacent slots,the second slot was allocated in advance partial of the data rate conventionally scheduled to the first slot when the corresponding user had perfect channel state.Consequently,most of the required data was loaded by the sub-carriers with fine channel gain and finally less transmitting power was needed.The simulation results indicate that the proposed algorithm can effectively decrease the transmitting power while meeting the users' target rate requirement.…”
    Get full text
    Article
  10. 570

    Privacy-protected crowd-sensed data trading algorithm by Yong ZHANG, Dandan LI, Lu HAN, Xiaohong HUANG

    Published 2022-05-01
    “…To solve the problem that data privacy leakage of participants under the crowd-sensed data trading model, a privacy-protected crowd-sensed data trading algorithm was proposed.Firstly, to achieve the privacy protection of participants, an aggregation scheme based on differential privacy was designed.Participants were no longer needed to upload raw data, but analyzed and calculated the collected data according to the task requirements, and then sent the analysis results to the platform after adding noise in accordance with the privacy budget allocated by the platform to protect their privacy.Secondly, in order to ensure the credibility of participants, a reputation model of participants was proposed.Finally, in order to encourage consumers and participants to participate in transactions, a data trading optimization model was constructed by considering the consumer’s constraint on the result deviation,the participant’s privacy leakage compensation and platform profit, and a POA based on genetic algorithm was proposed to solve the model.The simulation results show that the POA not only protects the privacy of participants, but also increases the profit of the platform by 29.27% and 20.45% compared to VENUS and DPDT, respectively.…”
    Get full text
    Article
  11. 571

    Virtual Network Embedding Algorithm for Diverse Service Request by Hua Qu, Lixia Wang, Jihong Zhao, Henan Wang

    Published 2014-12-01
    “…In order to solve these problems, virtual network embedding algorithm for diverse service requests was proposed. …”
    Get full text
    Article
  12. 572
  13. 573
  14. 574

    Evaluating the Power of GPU Acceleration for IDW Interpolation Algorithm by Gang Mei

    Published 2014-01-01
    “…We first present two GPU implementations of the standard Inverse Distance Weighting (IDW) interpolation algorithm, the tiled version that takes advantage of shared memory and the CDP version that is implemented using CUDA Dynamic Parallelism (CDP). …”
    Get full text
    Article
  15. 575

    Anonymization algorithm based on time density for data stream by Jing XIE, Jian-pei ZHANG, Jing YANG, Bing ZHANG

    Published 2014-11-01
    “…Aim to address the problem of anonymization on data streams,an anonymization algorithm based on time density for data stream was proposed.Time weight and time density were designed for describing the data stream’s temporal,when the published clusters reach the threshold,it will delete the minimum time density cluster to ensure the availability of published clusters.Furthermore,in order to maintain the higher efficiency,the algorithm scans the data only once to satisfy the anonymization requirements for speeding up.The experimental results on the real dataset show that the algorithm is efficient and effective meanwhile the quality of the output data.…”
    Get full text
    Article
  16. 576
  17. 577

    Research of survivability enhancement algorithm based on autonomous configuration by ZHANG Le-jun1, ZHOU Yuan2, GUO Lin1, WANG Wei1, YANG Yong-tian1

    Published 2007-01-01
    “…Based on redundancy and diversity,the method of enhancing system survivability was proposed by dynami-cally configuring atomic modules.According to the history average response time,survivability curves were drawn.The autonomous configuration algorithm was designed based on the survivability of atomic modules,system efficiency and quality of service.The contrast experiment validated the algorithm’s correctness and validity in the condition of atomic modules have different failure rate.The simulation confirmed that this algorithm can enhance the service survivability when atomic module under attack or be ageing…”
    Get full text
    Article
  18. 578

    LANDMARC indoor positioning algorithm based on density-based spatial clustering of applications with noise–genetic algorithm–radial basis function neural network by Jingqiu Ren, Ke Bao, Guanghua Zhang, Li Chu, Weidang Lu

    Published 2020-02-01
    “…Aiming at the problem that existing radio frequency identification indoor positioning algorithm is prone to environmental interference and poor positioning accuracy, a LANDMARC indoor positioning algorithm based on density-based spatial clustering of applications with noise–genetic algorithm–radial basis function neural network is proposed. …”
    Get full text
    Article
  19. 579

    Naïve Bayes is an interpretable and predictive machine learning algorithm in predicting osteoporotic hip fracture in-hospital mortality compared to other machine learning algorithms. by Jo-Wai Douglas Wang

    Published 2025-01-01
    “…Overall, NB has much potential as an algorithm, due to its simplicity and interpretability whilst maintaining competitive predictive performance.…”
    Get full text
    Article
  20. 580